While IT administrators often innately understand the cost of not addressing a cybersecurity project, it can be hard to get non-IT management to understand why certain projects should be prioritized. In their July 2018 survey, Spiceworks and AT&T found... Read More
Password Policy Management
Specops Password Policy comparison and price
In the market for a third-party password policy solution? If an audit has revealed poor password practices, you may look to Microsoft Fine-Grained Password Policy (FGPP) for additional flexibility over default domain password settings. Unfortunately, FGPP still lacks a... Read More
Using Group Policy to configure BitLocker
How to use Group Policy to configure BitLocker. This is useful for organizations with a compliance mandate to enable encryption for all endpoint devices. Read More
What causes BitLocker Recovery Mode and how to resolve it?
This blog will look at the root causes of BitLocker Recovery Mode, and how you can mitigate its impact on the helpdesk with self-service key recovery. Read More
How to enforce password history in Active Directory
The “Enforce password history” setting in Active Directory is used to determine the number of unique passwords a user must use before they can use an old password again. This is an important setting because password reuse is a... Read More
How to change user passwords in Active Directory
We often get asked how our self-service solution changes passwords on a user account in Active Directory. It’s a more interesting question than it sounds as there are many processes at work here, and many ways to do it.... Read More
Specops Authentication Client and Duo Authentication for Windows Login
The Specops Authentication Client provides enhancements to the Windows logon experience by wrapping the built-in Windows credential provider (GINA). This includes allowing users to reset their passwords from the login screen, as well as enhancing the feedback users receive... Read More
Best practice tips for your password policy
Many organizations have yet to craft an effective password policy - the policy says one thing, but something very different is taking place on the network. Is your current approach to passwords adequate? Read More
Why is a leaked password list so important?
Many of the major breaches come down to one simple (and overlooked) factor: the password. With password reuse, it only takes one compromised password to lead to a company breach. Read More
How and why the NHS should transform password policy for greater security
The password policy guidance from the NHS doesn't stand a chance against today's attacks. With a single breach opening the door to other systems, the NHS needs to stop users from using vulnerable passwords. Read More